会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Computer system which is disabled when it is disconnected from a network
    • 计算机系统在与网络断开连接时被禁用
    • US6105136A
    • 2000-08-15
    • US23606
    • 1998-02-13
    • Daryl C. CromerBrandon J. EllisonHoward J. LockerMichael J. SteinmetzRandall S. SpringfieldJames P. Ward
    • Daryl C. CromerBrandon J. EllisonHoward J. LockerMichael J. SteinmetzRandall S. SpringfieldJames P. Ward
    • G06F1/00G06F21/78G06F21/86G06F11/30
    • G06F21/86G06F21/78
    • Described is a computer system which is coupled to a remote computer via a data communication link. The computer system has a normally closed enclosure and is capable of securing data retained within the system against unauthorized access. The computer system includes an erasable memory element mounted within the enclosure for selective activation to active and inactive states and for receiving and storing a security password when in the active state. A manually operable option switch is mounted within the enclosure. The option switch is operatively connected with the erasable memory element and manually settable by a user of the computer system for setting the erasable memory element to the active and inactive states. A communication line detector is operatively connected with the erasable memory element for detecting a disconnection of the data communication link and for clearing any stored security password from the erasable memory element in response to a change of the communication link detector between a first state and a second state.
    • 描述了经由数据通信链路耦合到远程计算机的计算机系统。 计算机系统具有常闭外壳,并且能够保护系统中保留的数据,防止未经授权的访问。 计算机系统包括安装在机箱内的可擦除存储器元件,用于选择性地激活到主动和非活动状态,并且在处于活动状态时接收和存储安全密码。 手动可操作的选项开关安装在外壳内。 选项开关可操作地与可擦除存储元件连接,并且可由计算机系统的用户手动设置,用于将可擦除存储器元件设置为活动状态和非活动状态。 通信线路检测器可操作地与可擦除存储器元件连接,用于响应于通信链路检测器在第一状态和第二状态之间的变化来检测数据通信链路的断开并用于从可擦除存储器元件清除任何存储的安全密码 州。
    • 6. 发明授权
    • Autonomic binding of subsystems to system to prevent theft
    • 子系统自动绑定到系统以防盗窃
    • US07269725B2
    • 2007-09-11
    • US10738183
    • 2003-12-17
    • Daryl C. CromerHoward J. LockerRandall S. Springfield
    • Daryl C. CromerHoward J. LockerRandall S. Springfield
    • G06F1/24G06F9/00
    • G06F21/6272G06F1/183G06F21/575G06F21/88G06F2221/2129
    • A method is provided of uniquely binding, through connection, a subsystem device having restricted information space for storing code, to a system having a structure for generating and delivering a unique code to identify the system to the information storage space in the subsystem. The method comprises determining if the information storage space in the subsystem has information therein when the subsystem is connected to the system. If no information is contained in the information storage space in the subsystem, the system writes the unique code from the system to the information storage space in the subsystem. If information is in the information storage space, that information is compared with the unique code in the system, and operation of the system is allowed if, and only if, the information in the information storage space matches the unique code generated by the system. A structure for performing this method is also provided.
    • 提供了一种通过连接将具有用于存储代码的受限信息空间的子系统设备唯一地绑定到具有用于生成和递送唯一代码以将系统识别到子系统中的信息存储空间的结构的系统的方法。 该方法包括当子系统连接到系统时确定子系统中的信息存储空间是否具有信息。 如果子系统的信息存储空间中没有信息,则系统将唯一的代码写入子系统中的信息存储空间。 如果信息在信息存储空间中,则该信息与系统中的唯一代码进行比较,并且仅当信息存储空间中的信息与系统生成的唯一代码匹配时才允许系统的操作。 还提供了一种用于执行该方法的结构。
    • 9. 发明授权
    • Method for controlling file access on computer systems
    • 控制计算机系统文件访问的方法
    • US08086873B2
    • 2011-12-27
    • US11446737
    • 2006-06-05
    • Howard J. LockerDaryl C. CromerRandall S. SpringfieldRod D. Waltermann
    • Howard J. LockerDaryl C. CromerRandall S. SpringfieldRod D. Waltermann
    • G06F12/14
    • G06F12/1475G06F21/78
    • A method for controlling file access on computer systems is disclosed. Initially, a virtual machine manager (VMM) is provided in a computer system. In response to a write request, the VMM determines whether or not a location field is valid. If the location field is not valid, then the VMM writes the write request information to a storage device; but if the location field is valid, then the VMM encrypts the write request information before writing the write request information to the storage device. In response to a read request, the VMM again determines whether or not a location field is valid. If the location field is not valid, then the VMM sends the read request information to a read requester; but, if the location field is valid, then the VMM decrypts the read request information before sending the read request information to the read requester.
    • 公开了一种用于控制计算机系统上的文件访问的方法。 最初,在计算机系统中提供虚拟机管理器(VMM)。 响应于写入请求,VMM确定位置字段是否有效。 如果位置字段无效,则VMM将写请求信息写入存储设备; 但是如果位置字段有效,则VMM在将写入请求信息写入存储设备之前对写入请求信息进行加密。 响应于读取请求,VMM再次确定位置字段是否有效。 如果位置字段无效,则VMM将读取请求信息发送给读取请求者; 但是,如果位置字段有效,则VMM在将读取请求信息发送给读取请求者之前解密读取请求信息。